Provisioning Intel Vpro Systems Using Altiris
Provisioning Intel Vpro Systems Using Altiris
NOTICE
INFORMATION IN THIS DOCUMENT : (I) IS PROVIDED FOR INFOR MATIONAL PURPOSE S ONLY WITH RESPECT TO PRODUCTS OF
ALTIRIS OR IT S SUBSIDIARIES (“PRODUCTS”), (II) REPRESENTS ALT IRIS‟ VIEWS AS OF THE DATE OF PUBLICATION OF THIS
DOCUMENT, (III) IS SUBJECT TO C HANGE WITHOUT NOTICE, AND (IV) SHOULD NOT BE CONSTRUED AS ANY C OMMITME NT BY
ALTIRIS. EXCE PT AS PROVIDED IN ALTIRIS‟ LICE NSE AGREEMENT GOVERNING ANY PRODUCTS OF ALTIRIS OR ITS
SUBSIDIAR IES (“PRODUCTS”), ALTIRIS ASSUMES NO LIABILITY WHATSOEVER, AND DISCLAIMS ANY EXPRESS OR IMPLIED
WARRANTIES RELATING TO THE USE OF ANY P RODUCTS, INCLUDING WITHOUT LIMITAT ION, WARRANTIES OF FITNESS FOR A
PARTICULAR PURPOSE, MERCHANT ABILITY, OR INFRINGEMENT OF ANY THIRD PARTY INTELLECTUAL PROPERTY RIGHTS.
ALTIRIS ASSUMES NO RESPONSIBILITY FOR ANY ERRORS OR OMISSIONS C ONT AINED IN THIS DOCUMEN T AND ALTIRIS
SPECIFICALLY DISCL AIMS ANY AND ALL LIABILITIES AND/OR OBLIG ATIONS FOR ANY CLAIMS, SUIT S OR DAMAGES ARISING
FROM OR IN C ONNECTION WITH THE USE OF, RELIANCE UPON OR DISSEMINATION OFTHIS DOCUMENT AND/OR THE
INFORMATION CONTAINED HEREIN.
Al ti ri s may have patents or pendi ng patent appli cati ons, trademarks, copyri ghts, or other i ntell ectual prope rty ri ghts that
rel ate to the Products referenced herei n. The furni shi ng of thi s document and other materi al s and i nformati on does not provi d e
any li cense, express or i mpli ed, by estoppel or otherwi se, to any fore goi ng i ntell ectual property ri ghts.
No part of thi s document may be reproduced, st ored i n a retri eval system, or transmi tted in any form or by any means wi thout
the express wri tten consent of Al ti ri s, Inc.
Customers are sol ely responsi bl e for asse ssi ng the sui tabili ty of the Products for use i n parti cul ar applicati ons. Produ cts a re
not i ntended for use i n medi cal , life savi ng, li fe sustai ni ng, cri ti cal control or safety systems, or i n nucl ear faci li ty appli cati ons.
Al ti ri s, Inc.
588 West 400 South
Li ndon, UT 84042
*Other company names or product s menti oned are or may be tradem arks of thei r respecti v e owners.
Informati on in thi s document i s subject to change wi thout noti ce. For the l atest documentati on, vi si t www.al ti ri s.com .
www.altiris.com
CONTENTS Introduction .............................................................. 1
Terminology................................................................. 1
Acronyms .................................................................... 2
Introduction to Intel AMT ........................................... 3
Overview of Out-of-Band Communication .................... 4
In-Band Communication .............................................. 4
Out-of-Band Communication ........................................ 5
Overview of Provisioning ............................................ 6
Flexible Provisioning ................................................... 6
Provisioning Is a Two-Step Process ............................... 6
After provisioning: OOB Discovery of the PC ................... 7
Why is AMT Setup and Configuration Important? ............. 7
Remote, Centralized Management of the PC ................. 7
Access to AMT Features Depends on Setup and Configuration 7
Customize the Client Configuration Profile ................... 8
Choose Initial Security during Setup and Configuration .. 8
Provisioning Models and Processes ............................. 9
Intel AMT Supports Three Provisioning Models................. 9
Enterprise versus Small Business Mode ....................... 9
Intel AMT Supports Three Setup Processes ................... 10
OEM Can Pre-Provision AMT ....................................... 11
Provisioning Flow .................................................... 12
Stage 1: Factory-Default State ................................... 12
Setting up Initial Security Credentials ....................... 13
Automated Setup Process ........................................ 13
Stage 2: Setup and Ready to Be Configured ................. 14
Loading the Configuration Profile .............................. 14
Automated Configuration Process ............................. 14
Stage 3: Configured and Ready for Integration ............. 15
Unprovisioning and Re-provisioning ............................. 15
Provisioning Considerations ..................................... 16
Remote Setup .......................................................... 17
Microsoft Certificate Authority is Required ................. 17
Remote Configuration Process .................................. 17
Scripting for Remote Configuration ........................... 17
Delayed Provisioning and Reinitializing the Hello Packets18
USB-Key Setup ........................................................ 18
USB Key Requirements ........................................... 18
Re-Provisioning via USB Key .................................... 19
Manual Setup .......................................................... 19
www.altiris.com
MEBx Parameters and Settings ................................... 19
Unprovisioning and Re-provisioning ............................. 21
Unprovisioning Intel AMT ........................................ 22
Re-provisioning Intel AMT ....................................... 22
Dependencies for Provisioning.................................. 23
Criteria Needed for Successful Provisioning .................. 23
Optimal Conditions for Provisioning ............................. 23
Infrastructure Dependencies for Provisioning ................ 24
DHCP/DNS/IP (Required) ........................................ 24
DHCP Server ...................................................... 24
DNS Server ........................................................ 24
Firewall/Router Ports .............................................. 25
Database Server Integration .................................... 25
SCS (Required) ..................................................... 25
SCS and Active Directory (Kerberos) ...................... 26
Key Elements of SCS ........................................... 26
Adding Device Information to the SCS Database ....... 26
Certificate Authority (Optional) ................................ 27
Remote Configuration Certificates ............................ 28
Server Authentication Certificates .......................... 28
Client Authentication Certificates ........................... 28
Wildcard Certificates ............................................ 29
Default HP Certificate Hashes ................................ 29
Active Directory (Optional) ...................................... 29
Support for Kerberos Authentication and 802.1x ....... 29
Active Directory Provisioning ................................. 29
SCS and Active Directory Tasks and Permissions ...... 30
Extending the Active Directory Schema ................... 30
Integrating SCS with Active Directory ..................... 31
Active Directory Hotfixes ...................................... 31
Security ................................................................... 32
Key Questions to Consider ......................................... 32
Security during Provisioning ....................................... 32
Security in Enterprise Mode vs. SMB Mode.................... 33
Security Methodologies and Technologies ..................... 33
Admin Username and Password ................................ 33
TLS Encryption ...................................................... 34
TLS Requirements ............................................... 34
How It Works ..................................................... 34
TLS Encryption and Mutual Authentication ............... 35
TLS, Altiris, and Redirection Traffic ........................ 35
Mutual Authentication ............................................. 35
Active Directory (Kerberos Authentication)................. 36
802.1X authentication profiles ................................. 36
Access Control Lists (ACLs) ..................................... 36
www.altiris.com
Securing the Management Console .............................. 37
Sample Integration Procedures ................................ 39
Procedure 1: Provisioning Using a USB Key ................. 39
Procedure 2: Remote Configuration ............................ 42
Step 1: Enable Remote Configuration ........................ 42
Step 2: Create a Configuration Profile ....................... 43
Step 3: Synchronize Resources ................................ 44
Step 4: Prepare the Altiris Real-Time Console Infrastructure (RTCI) profile 45
Step 5: Install the Remote Configuration Certificate .... 49
Import the Certificate to the Local Computer Certificate Store 50
Examine the Remote Configuration Provisioning Certificate 52
Finish Installing the Certificate .............................. 55
Complete and Monitor the Provisioning Process ........ 57
Procedure 3: Unprovisioning Intel AMT (Two Methods) .. 58
Method 1: Unprovision Intel AMT on the PC ............... 58
Clean Up the Management Domain ........................... 60
Method 2: Unprovision in Preparation for Reprovisioning Using Activator
Utility .................................................................. 61
Procedure 4: Active Directory Extension through Altiris . 62
Step 1: Extend the AD Schema ................................ 62
Step 2: Configure Kerberos ..................................... 65
Step 3: Create Kerberos Profile ................................ 66
Procedure 5: Setting up TLS Certificates ..................... 71
Step 1: Set up the Certificate .................................. 71
Step 2: Verify that the Provisioning Service Is Requesting Certificates 74
For More Information ............................................... 76
www.altiris.com
INTRODUCTION
This document explains the theory behind provi sioning and how the provisioning
process with PCs with Intel ® Core™2 processor with vPro™ technology (PCs with
Intel ® vPro™ technology) and Intel ® Active Management Technology (Intel ®
AMT) works in conjunction with Altiris.
Terminology
Note that during provisioning:
In-Band Communication
In-band communication is software-based and is at the OS level. In-band
communication establishes a connection through the software stack in the PC‟s
OS.
The same management application, such as Altiris, can also be used to access
the out-of-band (OOB), hardware-based capabilities of Intel AMT.
OOB communication with Intel AMT occurs via a secur e connection between
the management console and the Intel Management Engine (which includes
Intel AMT). Connectivity to the management engine requires authentication
of the user via an admin password, which defines the user‟s rights and
privileges.
Remote OOB access to the hardware-based capabilities of Intel AMT can
occur only through the secure connection established between the
management console and the Intel Management Engine.
Because this connectivity requires authentication, OOB communication is
more secure than in-band communication.
Because communication to Intel AMT is independent of the OS, Intel AMT is
also less vulnerable to the operation and security problems that typically
affect an OS and/or the applications installed at the OS level .
Because OOB is both secure and is independent of the OS, the connection to
Intel AMT can be used to securely and remotely manage the PC even if the
PC is not powered up. The connection is also available if the OS is down,
management agents are missing, or hardware (such as a hard drive) has
failed. For an administrator, this means patches and software updates can
be remotely loaded into an Intel vPro PC even if PC power is off at the start
of the update cycle.
Flexible Provisioning
Intel AMT provides significant flexibility in order to meet the needs of vari ous
customer environments. This flexibility leads to a number of deci sions that have
to be made as you plan and implement your deployment of Intel AMT-enabled
systems. For example, you must decide whether to use SMB or enterprise
provisioning mode, whether to use Active Directory (Kerberos) to improve
security, and make other similar decisions.
Intel AMT supports three types of provisioning: advanced, standard, and basic,
to accommodate different IT needs for various levels of automation and different
customer environments.
Intel AMT also lets you choose different types of security for provisioning,
including certificates and keys. These and other, built -in security technologies
and methodologies (see the security discussion later in this document) are used
to secure communication with Intel AMT during provisioning.
A setup and configuration service provides the tools needed to set up and
configure Intel vPro PCs for use with the Altiris console.
During setup, initial security credentials are established, as well as the initial
networking and operational parameters required to initiate configuration.
During configuration, BIOS and MEBx parameters are set to appropriate values
for your management environment. This includes loading a client configuration
profile into AMT, which tells the system which AMT features are enabled on the
PC, what authentication mechanism will be used, and which users have access to
AMT features.
After provisioning, you are ready to integrate the AMT-enabled PC into the Altiris
console.
Once the PC has been integrated into the management domain, you can use
Altiris to access the Intel AMT capabilities and perform a remote OS and/or
application build.
Once the OS is available, you can use typical in-band management to
monitor, maintain, and manage the PC.
You can use OOB management through Intel AMT to remotely monitor,
maintain, and manage the PC in circumstances in which the OS is not
responding, management agents are missing, PC power is off, or hardware
(such as a hard drive) has failed.
The processes vary based on how the initial Intel AMT security credentials,
networking parameters, and operational parameters are entered into BIOS and
MEBs. These values can be loaded into the PC as a fully automated process
(remote configuration), a light-touch process (USB key), or a manual process.
You can provide the security keys to the OEM for integration into MEBx, or the
OEM could provide you with a list of keys they generated when doing the initial
MEBx setup. The keys must match between the Intel vPro PCs and the Altiris
console. Altiris includes an option to import and export keys for this task.
Factory state:
AMT disabled
No network configuration
Setup state:
AMT enabled
Basic network configured
Admin credentials loaded
Configured state:
AMT fully configured (for example, power policies are set)
Security credentials fully loaded
Ready for remote management by the Altiris console
Once AMT is configured, the AMT-enabled PC is ready to be integrated with your
Altiris console.
Intel AMT security credentials and MEBx parameters are set to the values
defined by the OEM.
The MEBx admin username and password are still set to their OEM factory
defaults.
In order to proceed, you must: set up the initial security credentials and
initial networking and operational parameters for communication with the Intel
Management Engine on the target PC. This can be done as a fully automated,
remote procedure (advanced configuration), or as a “light touch” (standard) or
manual (basic) procedure.
Note that the SCS can be configured to locate Intel AMT-based PCs either from
within the SCS database or via a script.
5. SCS looks in the SCS database for a configuration entry matching the UUID
in the hello message. (If there is no match and no script, SCS revisits the
queued hello message periodically to see if an entry was added to the
database.) Based on the UUID in the hello message, the SCS searches the
database to locate the profile and host name to be used to setup and
configure the PC. If the SCS is configured to do so, it may execute a script
to acquire the necessary parameters from sources outside the database, and
then store the information in the database.
6. Once a configuration match is determined, SCS requests a certificate for the
PC from a Certificate Authority server. This step is optional for deployments
that do not use TLS. This step is required for deployments using TLS and
mutual authentication.
7. If Active Directory integration is enabled, the SCS defines the Intel vPro PC
as an AMT object in the Active Directory domain controller
8. The SCS sends to the Intel Management Engine the following information:
Certificates from a public Key Infrastructure (PKI).
Access Control Lists (ACLs).
Other setup parameters, as defined in the profile setup and
configuration information, specific to that PC or to a group of PCs.
As soon as security credentials are established and trust validated, Intel AMT is
ready to be configured. The SCS can now load the profile into the target PC and
complete configuration using SOAP commands.
After the provisioning profile is loaded, Intel AMT is configured for your
operational environment, and you can access the Intel AMT capabilities through
your Altiris management console.
Note that, if the PC was previously discovered and integrated as a typical, non -
vPro PC, you must use Altiris to rediscover the PC as an Intel vPro PC in order to
access Intel AMT capabilities through the Altiris console.
Integration consists of defining the OS‟s FQDN, integrating the PC with Active
Directory, and integrating the PC with the management console.
First, the FQDN in the PC‟s OS must be defined and the system must be
integrated with Active Directory. SCS uses identification information, found
in the platform UUID for each Intel vPro PC, to determine the FDQN of the
OS, which profile to use for the OS, and where to place the Intel vPro PC in
the Active Directory.
After the OS is provisioned and joined to the Active Directory, scripted
actions are performed to integrate the OS and Intel AMT with the Altiris
console. This activity enables proper management behavior of Intel AMT
capabilities with Altiris.
Note that failure to properly coordinate the FDQN between Intel AMT and the
OS does not affect normal OS management activities, but does greatly
degrade Intel AMT capabilities for PC management.
Once Intel AMT is successfully provisioning and the system integrated with the
Altiris console, you are ready to begin remotely managing the system via Intel
AMT.
The RCT (remote configuration tool) reads the UUID and FQDN of the PC and
loads that data into the provision server database. The RCT uses the SOAP
API to send the information to the database.
The provision server script runs upon receipt of the PC‟s hello packet, and
uses WMI protocol to talk back to the PC and read the sent UUID and FQDN
data.
You can use the Altiris Agent interface to remotely restart the provisioning
request for Intel AMT. This is the delayed configuration feature in the Altiris
Agent. Delayed configuration tells Intel AMT to send hello packets for the next 6
hours, using the Altiris Agent interface. Delayed configuration is an in -band
function and requires the Windows OS to be running and the Altiris Agent to be
installed on the PC. Delayed configuration also requires DHCP.
USB-Key Setup
USB key configuration is a one-to-one method of provisioning. The administrator
password and PID/PPS keys are generated by Altiris and exported into the USB
key. The USB storage device is taken to the physical location of the Intel vPro
PC which needs to be provisioned and is used to upload provisioning information
into the system.
To use the USB setup method, the Intel Management Engine settings must be in
the factory-default state (AMT must not be set up or configured).
Format the USB key as FAT 16. Some USB keys come formatted as FAT 32.
Do not use USB keys larger than 2 GB.
Have only the setup.bin file created during the security key export process
on the USB.
For instructions on how to provision an Intel vPro system using information
downloaded into a USB key, refer to the lab exercise in this document.
Manual Setup
Manual provisioning is a one-to-one method of provisioning an Intel vPro PC by
typing the PID/PPS keys into the BIOS and/or MEBx. The PID/PPS keys are
generated by Altiris.
This method is done only when other provisioning methods have not worked . It
is a time-consuming methods, and because it is manual, can introduce errors
into the setup and configuration process (with the result that provisioning is
more likely to fail). Manual provisioning should only be used as a last resort
backup measure.
For instructions on how to manually provision Intel AMT using Altiris, refer to the
Altiris Out of Band Management Solution 6.2 Administrator‟s Guide.
OEM setup and configuration assumes that BIOS and MEBx parameters are set to
typical defaults (See table below).
The hardware vendor uses a factory firmware tool or an in-circuit test (ICT) tool
to generate and configure PID and PPS values into a flash device. The tool keeps
a database of values (UUID, Macs, PID, and PPS) that are burned into the flash
device.
1. The OEM enables the Intel Management Engine throughout BIOS, sets the
power policies for the management engine, and enables Intel AMT in MEBx.
2. A factory firmware image tool (or ICT tool) generates and configures PID
and PPS values into the Intel AMT persistent memory (memory not located
on the hard drive).
3. The OEM loads the PC‟s UUID and MAC address(es) into the Intel AMT
persistent memory. The OEM may also choose to customize other setup
parameters during this procedure.
4. At the end of a production run (or at appropriate intervals), the tool uploads
its database of values onto a CD/DVD-ROM or other convenient storage
device.
5. The factory ships the CD/DVD-ROM to the IT department.
1
The Intel Management Engine and Intel AMT must be enabled in order to set -
up, configure, and use Intel AMT.
2
Setting power policies for the management engine to s1-s5 allows Intel AMT to
initiate configuration in any power state, as soon as the pc is connected to
power and plugged into the network.
Note that an OEM might provision multiple PCs with the same same PID/PPS
key. In this case, IT must reprovision the systems in -house to establish a unique
PID/PPS key for each PC..
For further information about the OEM provisioning process, refer to the Altiris
Out of Band Management Solution 6.2 Administrator‟s Guide.
The PC‟s FQDN must map accurately to the PC‟s UUID in order to produce a
final handshake, which confirms the provisioning process.
The OS’s FQDN has been established. This may include integrating the PC
into an enterprise directory infrastructure.
A dynamic DNS record for the PC has been created. Once provisioning
is successfully completed, subsequent PC management requests work best
when the PC‟s IP address is resolved via DNS.
The Altiris Notification Server Client agent is installed and has
registered with the associated Altiris Notification Server which has the role
of ProvisionServer in the context of Intel vPro configuration.
DNS
IP Address (DHCP)
SCS, including integration with the provisioning database
Management console (Altiris console)
The infrastructure for provisioning can also include optional elements to improve
security or support wireless devices:
DHCP/DNS/IP (Required)
The network and management infrastructure must support DHCP services so that
the vPro PC can be properly registered within the enterprise. DHCP allows Intel
AMT to receive the proper parameters for DNS, including the DNS suffix, which
is used in the provisioning process.
DHCP Server
When an vPro PC enters setup mode, the default for IP addressing is for AMT to
obtain an IP address from a DHCP server. The Intel Management Engine also
uses the DHCP server to help dynamically update the DNS server with its
network address information.
The DHCP server registers the FQDN with DNS, in order to generate the PKI
(public key infrastructure) certificate. Standard DHCP opt ion 81 is used to
register the vPro PCs in DNS. The DHCP server must support Option 81 to
register network address information into the DNS server on behalf of the ME.
The DNS is queried by the configuration server in order to compare the value of
that registration information against the received certificate. This enables the
server to accept TLS encryption.
DNS Server
The DNS Server is used by network devices such as the Altiris console to locate
address information for vPro PCs in order to contact the devices and manage
them. The vPro PCs may also use the DNS server during the configuration phase
to locate the provision server and request the information needed to configure
AMT in that environment.
24 < The Process of Provisioning www.altiris.com
Specifically, DNS is used to supply the host name for the vPro PC in order to
resolve the IP address and resolve the setup and configuration server IP address
during provisioning. Each host name and IP address for the Intel AMT -enabled
PC is automatically registered in the DNS by the DHCP. During the initial
activation process, the static IP name is resolved and registered in the DNS and
mapped to the SCS IP address.
If the provision server IP address was not manually entered during the Intel AMT
MEBx setup process, then MEBx makes a DNS request for the name
"ProvisionServer." If the requested name cannot be resolved by the DNS server,
then a second request is made for "ProvisionServer.DomainName." Intel AMT
expects to find the IP address of the provision server in this way, or by having it
set explicitly in the MEBx configuration process.
You must manually register the “provision server” entry into the DNS server.
Firewall/Router Ports
Intel AMT requires certain ports to be “open” in order to allow management
traffic to go through them. The Intel AMT ports are 16992 (non -TLS), 16993
(TLS), 16994 (non-TLS redirection), 16995 (TLS redirection) – these are IANA-
assigned ports which Intel purchased. They cannot be changed. Port 9971 is
used in enterprise mode to listen for hello packets. This port is configurable at
both the SCS console and the Intel AMT client.
SCS (Required)
SCS is a windows-style web service, accessed via a web interface. It is used to
perform steps necessary for setting up Intel AMT and configuring it for your
networking and operational environment. SCS also manages the configuration of
the Intel Management Engine. SCS stores settings and option choices for
certificates and security settings, while also verifying trust to the Intel
Management Engine. SCS acts as a proxy to Active Directory and the Certificate
Authorities.
The SCS server is required for enterprise provisioning and for remote
configuration (fully automated provisioning) of Intel AMT.
SCS keeps profiles, keys, and passwords securely within the SQL server
database. Requests for activation by the Intel AMT hosts are made to SCS, which
applies policies to the host and delivers certificates and/or passwords from the
certificate authority. SCS also accepts commands from Altiris. SCS provides
appropriate policy information in the form of ACLs, passwords (if not integrated
with AD), and appropriate meta-data to describe the Intel AMT host to Altiris, so
the Intel AMT-enabled PC can be managed.
There are three ways to add device information to the SCS database:
Manually: The UUID and other parameters are entered into the new Intel
AMT configuration parameters.
SOAP API: AddServiceNewAMTProperties adds an entry to the SCS
database. An external management console can acquire the PC‟s information
using scripts, its own database, or a local agent and pass the information to
A certificate binds information about an entity (such as the entity‟s name and
address) with the entity‟s public key. The binding is done by a certificate
authority (CA), a trusted third party.
Un-secure DNS (Intel AMT 2.2 and 2.6) checks the server authentication
certificate and the OU or object ID (OID) information set for Intel AMT. It also
checks that the domain name of the RCFG certificate CN (Intel client setup
certificate) field equals the domain name received from the DHCP server and
that the certificate is traceable to trusted root certificate hashes.
Secure DNS (Intel AMT 3.0) checks the server authentication certificate and the
OU or OID information set for Intel AMT. It also checks that the domain name of
the RCFG certificate CN field equals the MEBx PKI Domain or RCFG certificate CN
field equals the MEBX SCS FQDN option. The certificate is also trac ed to
determine if it originates from a trusted root certificate hash.
The HP Intel Centrino PCs with vPro technology come with five default cer tificate
hashes. The present interface/setup for these units does not allow these
certificate hashes to be amended. If a certificate can be generated internally and
applied to installed hashes without altering the installed hashes, then use those
certificates. If not, you will have to purchase an external certificate. The OID
can be used to create certificates for the remote configuration certificate – yet it
may be easier to use an Intel client setup certificate (CN)
When using AD, interaction between Management Console applications and the
Intel AMT API is authenticated with the Integrated Windows Authentication mode
via the API authentication mechanisms.
The AD service is used to authenticate between the Altiris console and Intel vPro
PCs. To enable use of AD, you must create instances of Intel-Management-
Engine, which is the special class added to the AD schema each time the SCS
completes setup and configuration of an Intel AMT device. These instances are
called “AMT objects.”
Active Directory schema extensions are not required for AMT OOB management,
but Microsoft recommends applying the schema extensions for other nonrelated
vPro capabilities. Refer to Microsoft documentation for t hese additional
capabilities. However, the Active Directory must have two items configured for
Altiris to manage AMT-enabled PCs.
Create the Active Directory OU container in the domain for each AMT-
enabled PC.
Configure security permissions on the container for Altiris to generate
an object for each AMT device. Altiris will publish an AMT object into a
specific OU for each vPro PC that is provisioned by the OOB Management
Service Point. This is a different object than the computer object that hosts
the computer account in the domain.
The Intel SCS installation contains an .LDF AD schema extension definition and a
script that is used to extend the Active Directory schema for Intel AMT. The AD
administrator must run the script and schema definition (provided with SCS) to
extend the AD schema for Intel AMT.
Intel SCS integrates the Intel AMT device with AD by creating a directory entry
based on a new class: Intel-Management-Engine. The SCS installation includes
scripts used by the administrator to:
Creates an Active Directory object representing the Intel AMT device: (Note:
This requires an SCS service account to have appropriate permissions to the
AMT Object Organizational Unit.)
Creates an attribute for connecting the AD computer object to the AMT
object.
For more information about AD, refer to the security discussion.
For proper operation, Microsoft hotfixes 899900 and 908209 are required for
Kerberos to work with Intel AMT. The fixes can be downloaded from the
Microsoft website and need to applied to all servers and consoles that will be
communicating with Intel AMT devices. Windows Server 2003 Service Pack 2
(SP2) includes these fixes and do not require them to be applied. Windows
Server XP requires the hotfixes. Investigation into the status of these with Vista
remains open at date of printing.
Intel vPro technology also allows you to choose the operati onal security level
appropriate for your client environment. Choosing the right security level for the
environment is important. Too much security can leave customers confused and
frustrated. Insufficient security can expose customer data or open vulnerabilities
to viruses, worms, and other threats.
Trust for communication with the SCS is established via the Intel Embedded
Trust Agent, Intel Trusted Execution Technology (Intel TXT), and other security
methodologies and technologies built into Intel vPro technology. These security
technologies help make sure that passwords, access control lists, and other
sensitive data remain protected during remote provisioning.
32 < The Process of Provisioning www.altiris.com
Security in Enterprise Mode vs. SMB Mode
Security is one of the key differences between using Intel vPro in SMB mode
versus enterprise mode.
TLS encryption
Mutual authentication (MTLS)
HTTP digest authentication
Active Directory (Kerberos)
Pseudo-random number generator in the firmware of the Intel AMT system,
which generates high-quality session keys for secure communication.
Only digitally signed firmware images (signed by Intel) are permitted to load
and execute.
Access control lists (ACLs) for Intel AMT realms and other management
functions.
The rest of this discussion provides more description for some of the security
methodologies and technologies you might need or want to set up or customize.
An admin password allows users to access and change Intel AMT features, as
well as set some security settings. To minimize vulnerability, only strong
passwords are accepted. Strong passwords must be at least 8 characters long
You can also change or randomize the default admin password that allows access
to Intel AMT features. If you randomize the password, authenticating to Intel
AMT with the default admin account will only be possible through the notification
server console.
In Altiris, you can enable password randomization of the default admin user on
the General tab of each provisioning profile.
TLS Encryption
Transport Layer Security (TLS) encrypts communication in order to secure traffic
to/from various elements of a network. TLS helps prevent snooping, altering,
and forged impersonation. TLS offers several benefits:
Greater security
Ensured authentic communication between Intel AMT and the server
Data integrity
Data theft prevention
TLS Requirements
TLS requires that Intel AMT have a self-signed certificate that is traceable to a
certificate authority. To use TLS for Intel vPro PCs in an Altiris environment, you
must install a Microsoft Windows 2003 Certificate Authority in the environment
and configure it to issue certificates automatically. The CA must be accessible
and associated to the Altiris provisioning service.
How It Works
Peer negotiation
Public key exchange with certificate-based authentication (TLS-PSK)
Symmetric code encryption
TLS places a server authentication certificate on the Intel vPro PC during the
provisioning process. The certificate is used to authenticate an endpoint of a
network communication connection, which ensures trust between the endpoints.
The data passed through the connection is encrypted by the certificate, which
prevents modification of that data.
TLS typically verifies and authenticates only the server , which means that Intel
AMT can be sure of the server's authenticity. Authentication is established by
TLS pre-shared key (TLS-PSK). The endpoint (the Intel AMT-enabled PC)
remains unauthenticated.
TLS can also optionally authenticate the client-side of the communication tunnel.
This is called mutual authentication. Mutual authentication requires that Intel
AMT have a self-signed certificate that is traceable to a certificate authority.
Note
Do not confuse the TLS security keys that are part of Altiris
interaction with the vPro PC, with the TLS-PSK keys that are used
during setup and configuration. These are separate keys. On ce the
TLS-PSK keys are used during the setup and configuration stage,
they are not used again unless an vPro PC is re-provisioned. The
other TLS keys are used for remote-management communications
from Altiris to the Intel vPro PC.
For additional information about TLS, see the Altiris OOBM solution reference
guide, page 59.
With PCs provisioned for TLS, a majority of the Intel AMT management traffic
functions will be handled normally via the Altiris console without further
changes. The one exception is redirection traffic. Redirection traffic includes
integrated device electronics redirection (IDE-R), which is used to remote boot
an Intel vPro PC, and serial-over-LAN (SOL), which is used for console
redirection of an Intel vPro PC. IDE-R and SOL are not based on HTTP protocols,
thus the default TLS negotiations within HTTP are not available. The Altiris Real-
Time Console Infrastructure will need to know the certificate path, which is
defined via a Privacy Enhanced Mail-format (PEM) file.
For information about configuring Altiris for redirection sessions when TLS is
enabled, refer to the provisioning guide: Intel® vPro™ Standard and Advanced
Provisioning in an Altiris Environment.
Mutual Authentication
In mutual authentication, the client and server authenticate each other by
requesting certificates from each other, so both client and server can be assured
of the other's identity. Mutual authentication lets you establish greater security
for network communications. Mutual authentication requires public key
infrastructure (PKI) deployment or TLS-PKI. Remote configuration (fully
automated setup and configuration of Intel AMT) requires mutual authentication.
Create instances of Intel Management Engine, which is the special class added to
the Active Directory schema each time the SCS completes setup and
configuration of Intel AMT capabilities. These instances are called „AMT objects.‟
Hardware Information
Event Log
Remote Control
Update Firmware
There are two kinds of ACL entries: Kerberos and non-Kerberos. Kerberos
entries have an Active Directory SID to identify a user or groups of users. Non -
Kerberos entries have a username and password for user identification.
There are several realms to choose from when configuring the ACLs , and
realms are often vague in their descriptions as to exactly what features they
enable. For a definition of each realm and additional information on planning
the ACLs, review the following article on juice.altiris.com:
http://juice.altiris.com/article/2040/passwords-permissions-and-access-
control.
Kerberos authentication
If using Kerberos authentication, determine whether the Intel AMT user(s)
are members of an Active Directory group
Determine whether you need a consistent approach throughout the
organization
If the ACL for all users or groups will remain consistent throughout the
organization, you will probably be able to create a single provisioning
profile. Managing multiple profiles can be difficult, so whenever possible,
consolidate profiles.
If a user or group will require more or less access to realms on certain PCs, you
will have to create alternate provisioning profiles for those systems.
Admin users of the provisioning console can be selected from the local system or
from Windows domain user lists. Each user can be assigned one of four roles:
Your network policies and operational modes will determine how you set up your
user lists and their associated roles. From a console and provisioning security
perspective, it may be best to give only a few (perhaps only one) users full
enterprise administrator access. The majority of users requiring access might be
only operators and log viewers.
Procedure 1:
Provisioning Using a USB Key
1. In the Altiris Console 6.5, select View > Solutions > Out of Band
Management.
2. In the left pane, select Out of Band Management > Configuration >
Provisioning > Configuration Service Settings (see Figure 5).
6. In the right pane, select the Export Security Keys icon . The Export
Security Keys to USB Key window will then be displayed From this
interface an administrator can determine the number of keys to generate,
the old and new MEBx password, and download the resulting setup.bin file
to a preferred location.
10. Go to the physical location of the Intel vPro PC, connect the cables
(including network cable), a monitor, and a keyboard.
11. Insert the USB key and power-up or restart the PC.
12. Follow the on-screen instructions to setup the PC. Note: The specific PID-
PPS key pair used to configure the PC is marked on the USB key as used, so
the key can not be used again.
13. Restart the PC.
The PC will begin sending hello packets to the notification server PC, and the
SCS will send the appropriate provisioning profile back to the Intel vPro PC.
Set to
Manual
Figure
Set Profile Set to
[numb
name and P@ssw
er]
description ord a. C
a
p
t
i
o
n
Figure [number]
Caption explaining the
5. Check the checkbox to remove duplicate Intel® AMT resources from the
notification server.
6. Under Enable Schedule, select Half-Hour.
7. Select Apply to apply the changes.
Enable
Default
Profile
Enter the
Digest User
and Password
Enter a Profile
Name
4. Once the new RTCI profile has been created, select it as the default profile.
This will be indicated by a green check mark (see Figure 14).
You must now specify the trusted domain and location of the PEM file where
TLS is included in the provision profile.
Select the
profile to set
as default
At this point, the basic setup (authentication) settings are in place, but the
Intel vPro systems cannot yet locate the ProvisionServer. A DNS record
needs to be created.
8. Access the Domain Controller virtual machine by selecting the VMware
toolbar at the top of the management console. The right arrow will switch
between virtual machines.
9. Open the Infrastructure Tools.msc Microsoft Management Console Snap-
in.
10. Navigate to the DNS entries for vProdemo.com and create a new entry by
right-clicking on the right window pane
11. Select New Alias (CNAME) and enter the following values (see Figure 16):
Alias Name: ProvisionServer
FQDN: Altiris.vprodemo.com
Follow these steps to access the personal certificate store and import the
certificate to the local computer certificate store:
Identify the
service account
3. Access the personal certificate store of the Intel SCS service account by
clicking on MSC for SCSserviceaccount shortcut located on the desktop.
This runs the following command:
runas /u:vprodemo\SCSserviceaccount mmc
4. At the prompt for the account password, enter P@ssw0rd.
50 < The Process of Provisioning www.altiris.com
5. Once the Microsoft Management console has appeared, click Open to open a
predefined MSC from the desktop. This will access the “My User Account”
certificate store (see figure 19).
7. From the certificate wizard, browse to the PFX certificate stored at c:\certs
(see figure 21).
8. If the certificate is not immediate available, ensure the file types is set to
.PFX. Select the second certificate shown –VeriSignCertBackup.pfx.
9. When prompted for a password, use Pr0t3ct!0n. (Note that the „0‟ is a zero
and the „I‟ is an exclamation mark.)
10. Select the Mark this key as Exportable check box and click Next.
11. When prompted to select a certificate store, select Automatically select
the certificate store based on the type of certificate . This will ensure
the intermediate and root certificates are added to the correct certificate
folders within the local computer certificate store.
12. Click Finish to complete the task. You should see a status message
indicating that the import was successful.
13. Press F5 if necessary to refresh the screen and update the display in ord er
to see the newly imported certificates.
Once the certificate has been imported, you should validate that the private key
is present.
The first view of the certificate, on the General tab, will include a note at
the bottom that the private key is installed (see Figure 23).
2. Select the Certification Path tab. The intermediary and root certificates
are shown (see Figure 24), providing the security chain path from leaf to
root certificate.
(If the intermediary or root certificates are not in the local PC certificate
store, make sure to obtain and load them.)
6. Check the Details tab of the root certificate to make sure the thumbprint
complies with the thumbprint or certificate hash on the Intel vPro system(s).
7. Click OK to close the Certificate dialog.
8. In the Certificate screen that lists the intermediary, root, and leaf
certificates, select the leaf node Intel(R) Client Setup Certificate.
9. Check the Details tab of the Leaf Certificate to make sure the subject
includes a CN with the same DNS domain context, along with an OU equal to
the Intel(R) client setup certificate. Both of these fields, along with the
certificate hash, will be important to the authentication process during
provisioning (see figure 26).
Once you have verified details, you are ready to use LoadCert.exe to finish
installing the certificate.
Now that you have set the remote configuration provisioning certificate an d
provisioning configuration, and configured the provisioning service, the
ProvisionServer can receive and process incoming or existing provisioning
requests. This process typically occurs within a few minutes or hours, depending
on task schedules, agent deployments, and other dependencies.
1. Return to the Altiris Provisioning console by select View > Solutions > Out
of Band Management.
2. Navigate to Out of Band Management Configuration Provisioning
Logs Log.
A few additional errors may have appeared, but after a successful
provisioning, the provisioning log will appear similar to Figure 29 . You can
also select Intel AMT systems above, and check system status, which will
now show as Provisioned.
With the configuration settings in place, the provisioning process is ready. The
Intel vPro PCs (which are ready to initiate configuring and direct their hello
packets) can successfully communicate with the ProvisionServer, and both client
and server can authenticate to each other.
You can also use the Activator utility in a script, or use the Altiris OOBTask
Agent via a defined schedule, or similar methods to help automate this process.
3. When the Real-Time Systems Manager page appears, select the Real-Time
tab. A screen similar to Figure 31 will appear. This interface is used for one-
to-one client management.
7. Close the Real-Time Systems Manager page for the client, and return to the
Altiris Console.
8. From the Out of Band Management solution menu, navigate to
Configuration > Provisioning > Intel® AMT Systems > Profile
Assignments.
9. Select the profile name of the target Intel vPro system (see Figure 33).
10. Click Delete.
Remember that, with the remote configuration process, you can reprovision Intel
AMT in a fully remote, automated process, vi a certificates and keys.
Note that agent-initiated remote configuration systems will wait until an agent
requests that provisioning begin before it will allow the Intel vPro PC to
reinitiate the hello packets.
Figure 34
3. Right-click on the name of the target PC and select Delete (see Figure 35).
At the next provisioning event, the Profile Assignment will need to be
defined and will be accomplished via the Intel vPro Activator Utility.
Figure 35
1. Access the Altiris Provisioning console by selecting View > Solutions > Out
of Band Management.
2. Navigate to Configuration > Provisioning > General.
3. At the General setting page, check the Integrate with Active Directory check
box. Blue text will appear next to this option: Extend the Active Directory
Schema (see Figure 36).
4. Select Extend Active Directory schema…
6. Click Extend. A log will appear that shows a summary of the schema
extensions that were made, and whether the extension was successfully
completed (see Figure 38).
7. Click Close to close the window.
8. In the General Service Settings pane, select Apply to apply the extension of
the AD schema (see Figure 39).
6. Click Browse to identify the target Active Directory user or group. A new
screen will appear similar to Figure 44.
11. Select the Realms for the features you want the user to be able to access.
12. Click OK to apply the changes.
The Kerberos profile is now enabled and can be applied to systems with Active
Directories extended (see Figure 47).
Note:
This procedure requires that a Microsoft Windows 2003 Certificate
Authority be defined for the provisioning service to issue
certificates on behalf of the PC clients.
8. Right-click the certificate profile and Click Edit in the drop-down menu, or
select the blue Add icon to add a new certificate profile.
9. In the Edit Certificate Generation Properties window, click ... (browse)
to choose the certificate host name and/or the template.
10. In the Type dropdown click Enterprise.
11. Click OK to edit or generate the certificate profile (see figure 51).
Intel vPro PCs with this profile can now be configured to accept and run TLS
certificates.